So as the Snowden enthusiasm spreads and more and more insiders with intimate knowledge of the broken system step up to expose the unconstitutional actions and illegal deeds that occur each and every day in the dark corner of US society well on its route to inevitable dissolution (ref USSR and WB Yeats), the question arises: how to do it, especially if one is not ready to take the full plunge and go public, facing the threat of death by treason by the same TTT state referenced above. How to leak information to the press and other distribution agents without tipping off the very espionage agency at the nexus of it all?

Luckily while information may be intercepted at every electronic turn, it still is largely free (at least until the advent of the Internet kill switch). So for all you wannabe Snowdens out there, here from Wired's Nicholas Weaver, is the perfectly timed "The Whistleblower’s Guide to the Orwellian Galaxy: How to Leak to the Press", which is by no means an exhaustive list of what one should do to preserve anonymity on the internet, but it certainly is a step in the right direction, and not just for leakers but for anyone who wishes to preserve some control over what information is intercepted daily. Because remember: assume everything you put out in the ether by electromagnetic waves is intercepted, decoded, stored and eventually used against you in a secret court above the law.

The Whistleblower’s Guide to the Orwellian Galaxy: How to Leak to the Press

Daniel Ellsberg, Mark Felt, Jeffrey Wigand, Sherron Watkins, Bradley Manning, and now… Edward Snowden. (He’s just the latest informant caught in the web of government administrations that view George Orwell’s 1984 as an operations manual.)

But while the list of government (and corporate) whistleblowers continues to grow, their options for leaking continue to shrink. It is, as one commenter noted, “a dangerous time to be right when the government is wrong.” We now live in a world where public servants informing the public about government behavior or wrongdoing must practice the tradecraft of spies and drug dealers à la The Wire. Even the head of the CIA can’t email his mistress without being identified by the FBI. And privately collected data isn’t immune, either; highly sensitive metadata is particularly vulnerable thanks to the Third Party Doctrine.

So how can one safely leak information to the press, let alone coordinate a Deep Throat-style meetup? The obvious choices: email, phone, and mail … but you’ve got to be really careful. Here’s a guide.

The parking garage where Bob Woodward met Mark Felt (Deep Throat).

Leaing by Email

The CIA supposedly already provided a guide to secure email, which the Russian Federal Security Service (FSB) translated back to English — convenient, given the situation we now find ourselves in.

Get a dedicated computer or tablet: the cheapest Windows laptop will do. And pay cash, as our normal laptops have a host of automatic synchronization and similar services. Our personal web browsers also contain all sorts of location-identifying cookies. Even if you’re logged in to but don’t actually visit Facebook’s home page, a subpoena to Facebook can still reveal where you connect and what pages you visit — every “Like” button reports to Facebook that you are visiting that particular page, at a particular time, from a particular IP address.

Leave your cellphone, your normal computer, and your metro card (like SmarTrip) at home: anything that speaks over a wireless link must stay behind. Then go to a coffee shop that has open Wi-Fi, and once there open a new Gmail account that you will only use to contact the press and only from the dedicated computer. When registering, use no personal information that can identify you or your new account: no phone numbers, no names.

Don’t forget: if you get anything at the cafe, or take public transit, pay cash. Be prepared to walk a bit, too; you can’t stay close to home for this.

Of course, the job still isn’t finished. When you are done you must clear the browser’s cookies and turn off the Wi-Fi before turning off the computer and removing the battery. The dedicated computer should never be used on the network except when checking your press-contact account and only from open Wi-Fi connections away from home and work.

Leaking Over the Phone

Again, start by leaving all electronic devices at home. Go to a small liquor store in a low-income neighborhood, and buy a pre-paid cellphone (TracPhone or similar) with cash. Make sure it has enough airtime to not expire for a few months — T-mobile prepaid is particularly good since the pay-as-you-go plan doesn’t expire for a full year if you buy $100 of airtime.

By the way, I would personally look for a store with security cameras that look old — a continuous tape or similar setup — since once the FBI has the number, the next step is to contact the store that sold the phone. Alternatively, you can get someone else to walk into the store and buy it for you.

You now own your very own “burner” phone — remember The Wire? – and this phone must remain off with the battery removed at all times. Because every active cellphone is effectively a continuous GPS, monitoring your location and feeding the information to the phone company which retains this information for weeks, months, even years. Just a warrant-step away.

Now, to use the phone … Once again, go to a different location without carrying your normal devices, turn on the phone, check your voicemail, make your call, turn it off again, and pull out the battery. Your phone calls are now (hopefully) anonymous so that when the FBI leak-hunt starts, there is no trail for them to follow.

Of course, the burner laptop or phone could still identify you if it’s ever found, as they both contain network identifiers built into the hardware. So if you ever need to abandon your device, first wipe the device back to its factory fresh configuration using any “secure erase” options available, then take a hammer and break the device. Put it in some other piece of trash (like an empty McDonald’s sack), go for another stroll, and drop in a public trashcan.

But if the feds are already following you, you’re caught anyway, so it doesn’t matter if they catch you taking out the trash instead of finding something when they search your home.

Leaking by Mail

Investigative journalist Julia Angwin of the Wall Street Journalpointed out that physical mail, dropped in a random post-box with a bogus return address, is perhaps the best way for anonymous one-way communication. Perhaps the best use of mail is simply to send the reporter a burner phone pre-programmed to only call your burner.

Believing that the U.S. Postal Service recorded specific mail address information only when asked by law enforcement, I had previously argued that there’s no history with mail — and even if there were, it could only be traced to the processing post office.

However, The Smoking Gun spotted — buried in an affidavit! — that the U.S. Postal Service records the outside of mail. According to the full affidavit (also available on RECAP; see page 5) the machine used to automate mail operations, the Automated Facer Canceler System, contains a “Mail Isolation Control and Tracking” program that photographs every single piece of mail and maintains this information for future access by law enforcement.

Although there’s no mention of optical character recognition to allow indexing by recipient rather than by postmark, leakers must now assume that the U.S. government is indeed recording the outside of everything we mail. A leaker should therefore access a public postbox in the same way s/he uses a burner phone: Leave all devices behind, walk to a remote postbox, and follow all the other guidelines above. But be sure to include a note to the reporter telling him or her to trash the envelope immediately.

***

All of this may seem like a script for a fictional T.V. show. But such extreme measures are a modern necessity if you want to leak information. Any future Deep Throat needs to follow these sorts of procedures if he or she wishes to talk to the press.

Though just imagine if Mark Felt had to do all of the above when leaking to Woodward and Bernstein. Snowden might have been willing to out himself … but not everyone is.

Getting a gmail account now I believe that you must give them a phone number for verification by sending you a text or a call back. At least that was true when I got a gmail acount overseas last month. I have not tried in the US.

This has now left me wondering what kind of 'terrorist attack' would have to be unleashed on the public for the Cheney/Obama administration to get the support needed to pass legislation requiring that ALL mail be sent in clear plastic ziplock baggies... one sheet only... folded and written side out...

Leaving your devices behind still isn't enough, you may have to consider getting somebody to use your devices while you're not, mimicing the same activity from a routine location, if you really want an airtight seal.

Hotmail accounts don't require any external forms of verification. No phone number, no second e-mail address.

Gmail tries to get existing users to give a phone number; I don't know about new users. Facebook started doing the same a few years ago, about when I stopped using it.

A number of services started to ask for "two-step verification" via phone, all about the same time. The knee-jerk interpretation is that PRISM is tying together accounts via common data like phone numbers. This has a, perhaps unintended, corollary, though: an account tied to a US phone number should be legally problematic for NSA's collection, if they want to claim that they don't knowingly collect data in-country. If a Gmail account is flagged with a US phone number, and PRISM collects data from that account, the PRISM operators have absolutely no cover from accusations that they don't know what country they're collecting from.

I'm not suggesting by any stretch of the imagination that anyone is suddenly immune from eavesdropping by attaching a US phone number to a Gmail account, but, if the partner companies like Google have been associating accounts with phone numbers for years, it would go some way towards rebutting NSA arguments that they can't determine the location of their data collection targets. It would be nice if someone in Congress asked about that at the next round of softball hearings.

I have had my hotmail account since before MS bought it. Consequentially, it attracts so much spam, it is the lowest tier of my junk accounts. OT (maybe) has anyone else noticed the damage control Google is attempting now on their Firefox start page?

Just dump the Gmail/Yahoo/Hotmail accounts or use them for trivia only... try some resources beyond the reach of Great Orwellian Republic apparatchiks such as Tencent QQMail with English user interface - more info here: http://en.mail.qq.com/ --> easy to set up, request only a little info, and definitely NO phone number is required!

What to censor??? have been using QQMail with no problem, they asked minimum questions; in fact yahoo did put some censor upon my outgoing emails many times, you may explore on your own if you happen to have email account at yahoo, just try to send out some emails with "agitative" subjects or "triggering" keywords, see how the yahoo reacts!

To choose between a giant Orwellian Republic and a said Police State, i prefer the latter knowing at least the latter won't drone you ;-) while the former has been repeatedly proven to favor violences and agressions into every part of the globe!! The giant Orwellian Republic simply knows no border in conducting their sickening violences and armed agressions!!

"The fact that Snowden fled to Hong Kong, a Chinese territory, is not evidence that he is a spy, but rather of the collapse of basic legal and democratic norms in the United States and all of its allies in Europe, Asia and around the world. As the illegal NSA spying on US citizens demonstrates, the differences between American “democracy” and the Chinese police state are rapidly narrowing. The class logic is the same."

Never forget that that particular outcome is EXACTLY what they need to get either the public support or create the apathy to gun rights necessary to remove all guns (and freedoms) from everyone ala the botched "Fast and furious" operation for good.

Remember it is the fear they may have of those with firearms (mostly just as a voting block right now) that stop them from taking everyones weapons away.

If shooting starts they have no choice but to act to preserve the status quo and remove your rights forever.

Besides there will be a whole lot of dangerous nuts out there if a state of anarchy ever arises... remember Iraq? ... just sayin'...

Now if you don't mind I've got to go and get back to my carrier pigeon breeding business... some guy with a heavy accent named 'Al' called and told me he'll take as many as he can get...

My take is: 'their' specialty is the use of force. If you give them an excuse to use force, they will. They will probably overdo it, even. Think Ruby Ridge x1000.

Force is the last resort, and even then, the fighting will have to take the form of asymmetric warfare AKA guerilla warfae AKA 'terrorism'. Guerilla warfare is what makes the continued use of force to oppress the population untenable.

Preferably, IMO, we win the Information War. But even that is easier said than done, when you are telling people not to trust the Gov't, the same gov't that has promised them SS, Pension, Medicare, old age benefits, etc etc etc. The key is telling them those promises were made to be broken. Still a tough sell at the end of the day, though.

You are correct. The "Information War" is where freedom will be either won or lost. Either that or merely become self sufficient and withdraw from their economy as much as practicality permits and the beast will eventually starve. Heck... the bankers have practically done all of the heavy lifting for us already...

Do NOT give them an excuse to act with force or all (and I mean ALL) will be lost.

I agree...A shooting war is what they want in the end. All these people who think that they can outshoot the military are delusional. Thats what they're counting on. They want anarchy so that they can bring in the military to "restore order". And the people will welcome it with open arms too. And it'll never go away after that...

If you want to really bring down the government I suggest going after their money. The financial system is the cornerstone of all the corruption this country but in reality its just a house of cards right now. The best way to take them down is to start a bank run. Have a coordinated effort to default on all debt and pull money out of the financial system. It wouldn't even take a majority of the country to pull it off. When they fall, refuse to bail them out and throw all those jackals in prison. Start again...hold new elections where all campaign donations are made by individual citizens and capped at a certain level..Make corporate and business donations illegal. They aren't people after all...they don't deserve to have a say.

Of course this would cause the whole system to crash...but I say better to take it down on our own terms. Its fucking coming down eventually anyway. But unfortunately this plan requires people to actually sacrifice and feel a little pain temporarily..which is always a tough sell...even when its better for them in the end..It requires people to get off their ass and take a risk. But its relatively bloodless and peaceful compared to the alternative.

I mean...Imagine say..100K people all signing an agreement that they agree to default on their debt and empty their bank accounts as soon as that number of signers is reached. That would do some damage...Multiply whatever leverage the banks are using on that money at the time..it would hurt them. If you publicize it well, then the panic would be contagious. As people started to see the number of signers rise they might get worried about their own money and pull it out before the number is even reached. Every new 20k or so after that would trigger the next wave of protesters...Some people might not agree with the idea of defaulting on their debts. But by doing it together you get more protection. I'm telling you...its the only right way to do it.

I don't know if anyone else suggested this on any of the other Snowden posts, but it's my opinion that the NSA surveillance program is about monitoring for uprisings by the citizenry... they are not looking for foreign terrorists, they're looking for regional dissenters. And they're monitoring foreign nations not because they're snooping, they're aiding and abetting the authorities in those nations. This is all in support of the Oligarch intention to install the NWO, so they need all controlled regions to be monitored to prevent any uprisings that will become an obstacle to their NWO.

Now that that's out in the open, maybe we can stop wasting so much time chest thumping about how we're all going to do something, next time, if things get any worse than they are this time. No one will do anything. It's already too late. But, now you know why the global machine built the global surveillance mechanism... to stop the citizens.

Edward Snowden’s revelations about the vast and illegal American electronic surveillance and spying operations inside the US and internationally have punctured the propaganda propagated by the Obama administration to justify its aggressive “pivot to Asia” aimed against China.

The US cynically presents itself as a force for regional stability, peace and “human rights” and the leader of Asian democracies—Japan, India and Australia—against the bullying of autocratic China. Under this guise, Washington has waged a determined offensive throughout the region to strengthen strategic alliances, build up military forces and consolidate trade ties in a bid to undermine Beijing’s influence.

In the lead-up to the recent summit with Chinese President Xi Jinping, the Obama administration mounted a concerted campaign aimed at branding China as the number one “cyber threat” to the US and the world. A Pentagon report last month directly accused the Chinese government and military of large-scale cyber intrusions into American government, military and corporate computer networks. During the summit, Obama provocatively declared that alleged Chinese cyber espionage was the “direct theft of US property.”

In reality, as Snowden’s exposure of NSA operations confirms, the US military and intelligence apparatus has built up the world’s largest and most advanced cyber warfare machine, which it aggressively uses against the American people and any country regarded as a current or potential threat to the interests of American imperialism.

As Beijing has repeatedly alleged, China is a prime target. Snowden presented specific evidence to the South China Morning Post in Hong Kong last week that the NSA had hacked into hundreds of civilian computers in Hong Kong and China since 2009, including Hong Kong’s Internet Exchange, which handles all of the city’s web traffic. Having gained access to network backbones, the agency could gather information from hundreds of thousands of computers.

“The primary issue of public importance to Hong Kong and mainland China should be that the NSA is illegally seizing the communications of tens of millions of individuals without any individualised suspicion of wrongdoing. They simply steal everything so they can search for any topics of interest,” Snowden warned.

American intelligence expert Matthew Aid provided further confirmation of the NSA’s massive cyber operations against China in an article last week in Foreign Policy. He revealed that the US has been engaged in large-scale hacking of Chinese computer and telecommunications networks for the past 15 years.

Aid also exposed the existence of a highly secretive unit within the NSA’s Signal Intelligence Directorate known as the Office of Tailored Access Operations (TAO). The TAO, he said, employs 1,000 military and civilian hackers, analysts and engineers. Not only has it produced “some of the best and most reliable intelligence” about China, he stated, but it has been tasked with assembling the information needed for the US “to destroy or damage foreign computers and telecommunications systems with a cyber-attack.”

These revelations expose the Obama administration’s lies that the NSA spying is to protect the US from terrorist attack. The criminality of the American cyber operations against China is rooted in the imperialist character of the entire policy of the “pivot to Asia.” The US is determined to use its military might to prevent any challenge from China’s economic rise to its dominance in Asia since the end of World War II.

The NSA’s massive cyber operations are intimately bound up with US preparations for war against China. High-level US intelligence sharing with close allies in Asia goes hand in hand with establishing new military basing arrangements with Australia, Singapore and the Philippines, restructuring and reinforcing existing US bases in Japan, South Korea and Guam, and building up anti-ballistic missile systems in the region as part of Washington’s nuclear war plans.

The US has encouraged allies such as Japan and the Philippines to take a more assertive stance against China, heightening tensions in maritime disputes in the East China Sea, South China Sea and other regional flashpoints. By elevating the alleged cyber threat posed by China, Washington is preparing the pretext for a provocative cyber attack that risks escalating into a wider conflict. The Obama administration has already claimed the right to launch pre-emptive cyber attacks—as it has already done against Iran’s nuclear program.

In the wake of the NSA revelations, the American media and political establishment have launched an all-out campaign to vilify Snowden for exposing the NSA’s criminal operations at home and abroad. The latest lie that he might be a double-agent working for the Chinese government is particularly sinister, given the Obama administration’s history of targeted assassinations of US citizens.

The fact that Snowden fled to Hong Kong, a Chinese territory, is not evidence that he is a spy, but rather of the collapse of basic legal and democratic norms in the United States and all of its allies in Europe, Asia and around the world. As the illegal NSA spying on US citizens demonstrates, the differences between American “democracy” and the Chinese police state are rapidly narrowing. The class logic is the same. Just as the Chinese government is preoccupied with suppressing social unrest, so the US financial oligarchy regards the American people as a threat to its vast wealth and privileges.

The defence of Edward Snowden is an urgent issue not only for workers in America, but in Asia and internationally. He is being targeted for exposing the extent of the intelligence apparatus that has been established by the US to prosecute war against its international rivals and suppress domestic opposition to its austerity agenda at home.

The drive towards war and dictatorial forms of rule is rooted in the breakdown of the profit system, which has produced sharpening geo-political tensions between rival capitalist powers and growing opposition and resistance in every country to the relentless assault on the social position of the working class. The defence of democratic rights can be realised only through a unified socialist movement of the international working class to abolish capitalism. This means the building of sections of the International Committee of Fourth International, the world Trotskyist movement, throughout Asia and around the world.

By the way, I believe that all governments all over the world are working at the behest of the Oligarchs, at least all of the nations that engage in central banking / international banking. I include China and Russia in there, along with India, and all the western nations obviously. I often see these events / stories as equivalent to entertainment TV, good cop bad cop. Sure, there may be naive / gullible politicians and affiliates all across the globe, but there are many bankers who are complicit, and there are many political / military personnel who are willing to cooperate for a bribe / favor, in support of the Oligarchs demands. So I don't think of China or Russia as a potential enemy, I see them as playing the black uniforms against the white uniforms of the western powers, in a war that is mostly a show to strengthen the control infrastructure of the oligarchs. A lot of innocent people will die but the result will be the same no matter who wins, if there is a winner...

We as a civilization are struggling through the transition from a Scarcity model to a Surplus model, and with the surplus comes a reduction in demand for labor... that is resulting in the global unemployment, that is resulting in the increasing debt, that is actually facilitated by the bankers in the first place. So we're living through 2 events... 1 is a natural evolution of civilization albeit the citizenry are completely unprepared / unaware, and 2 is the intentional destruction of the Surplus model by the Bankers / Politicians / Military / Police / Oligarchs, so they can retain control within the Scarcity model. If only people could see the magnitude of the circumstance... we can either enter into a future of prosperity / plenty, or we return back into a depraved financial system of deprivation / dark ages. I'm trying my damndest to get these people to listen, but so many are hell bent on preserving the scarcity model so they can add value to their tiny penises. Go figure.

This looks pretty good, but I'd suggest using Tails (https://tails.boum.org/) on a live USB drive on the throwaway computer. Tails will provide access via TOR, by default records nothing to the drive, and when removed from the PC, the PC behaves normally and will have no trace of the Tails activities on it, nor will the Tails USB drive have any information, either.

If you want to get fancy, use a USB wireless card as well, perhaps removing the laptop's own wireless card. Then you only have to dispose of a tiny USB dongle and the USB drive to get to deniability status.

Tails includes macchanger out of the box, but it isn't configured to run automatically so you would need to run macchanger -a <devicename> from the command prompt w/ the desired interface temporailly disabled (or modify netcfg, or build your own customized live cd) - you can also install Tails on an SD (or micro SD) memory card instead of a USB drive which is easier to lose if necessary, and can be innocuously stored in a cell phone or digital camera when not needed.

So far it looks more like the real deal than not. I can't imagine for what reasons TPTB would wish to bring this kind of attention to their programs this early in the game unless they do something so horrible to him that they are certain no one will ever leak again.

The one reason I am pretty sure this is real is implicating major companies like Google, Apple, MS and Facebook. Doing anything that effects the bottom line of these massive oligarch controlled corporations is a big no no in any op.

Now the big companies can add the payments the government gives them for their compliance to their valuation. Maybe this is why Amazon, Netflix and others get their high market cap off low profit margin, free BennyBucks handed out to the most favored snitches.

One just never knows so don't get too blinded by emotional attachment to the guy yet... but that said I just LOVE his actions to date.

Perhaps even Obama himself was compromised by information gleaned against him by these programs... I mean keeping Gates and taking back onboard Summers et al after what they did to the economy under Clinton?

To many people got emotionally attached to Obama's "Hope & Change" and as a result of being lied to will likely never vote for a "change messaging" politician (if any) ever again.

A certain amount of skepticism would be healthy countering any information coming from Media, main stream or otherwise. However, this kind of paranoid dismissals based on nothing is particularly annoying.

What kind of past an individual should have to make you feel comfortable he's sincere and this is the real deal?

Now assume you were in his shoes and with the proper motives, what would you have done differently?

Assume this is a fake story which purpose is yet to be uncovered, cui buno?

Assume this was a set up, why would the satanic vampire Cheney come out in broad daylight?

Assume the company tried to neutralized him now, wouldn't that be a bigger blow to them than whatever he had to leak?

Assume this was a real story, and the only way they could burry it, is to make the news about HIM and not about what he had leaked?

LOL. Revealing a surveillance program (which intelligent people have known about for years and decades) serves the interests of the people who run the program. The revelation alone is not enough to cause a backlash, that much is totally obvious. What it does cause is a slight modification of behavior from awareness of surveillance. Simple, really simple, psychology.

Most leaks end up benefitting the target organization. Sorry, that's just how it works. It takes a lot of dirt to bury a powerful organization. A lot more than one person, apparently, can gather. That's the real problem, the lack of any really damning and previously unknown material.

It's called a partial hangout. Part of a wag-the-dog operation. Cui bono ... I'll give you three guesses.

We'll drink our own liquor, our brandy from peaches,A fig for the English, they may kiss all our breeches.Those blood-sucking, beer-drinking puppies retreat;But our peach-brandy fellows can never be beat.

It is your type of reality-avoiding Statist with a man-vagina who betrayed conservatism in this country. You vote over and over again for a percieved lesser evil and then wonder how the fuck it all went wrong.

If you can't vote on priciple and embrace the lies both sides of the isle hold so dear, then you deserve the diapers and servitude this rogue government wants you in.

You douchebag, the architects of Obamacare were the same people who authored the monstrosity of Romneycare, and Romney disarmed people in Massachusetts. What was the fucking difference between the two?

Good point, and don't forget they've got software that can recognize your walking gait, too. So look different every time you go out to do your Deep Throating, and change your gait. Wear shoes of a different height, put a bottlecap in one shoe so you limp, walk slow one time, walk really fast the next, get shoes with lifts.

I've heard that Windows 8 sends all sorts of information back to Microsoft (which I think was one of the first companies to agree to send information to the US gov.) Probably a good idea to avoid it. I've also heard that it is just a pain to use.

All versions of Windows do. But they're not alone, so do Android and MacOS.

I've set up a network sniffer on my network and configured Android devices to only use WiFi, and there's a shitload of data sent to google the moment the thing is turned on, and periodically thereafter. Much of it is encrypted so you don't even know what it's sending. Two different Macs I've had did the same thing, and the amount of shit coming from Windows is staggering.

It's not great for gaming, etc, but linux, my friends, particularly distributions meant for security, is where it's at. I've done the same monitoring and the only thing you'll see that you didn't authorize is DHCP/BOOTP messages on boot unless you turn network boot off in BIOS. This is why I suggested Tails earlier, it covers all of this.

Recently, an Android application came to us for analysis. At a glance, we knew this one was special. All strings in the DEX file were encrypted, and the code was obfuscated.

The file turned out to be a multi-functional Trojan, capable of the following: sending SMS to premium-rate numbers; downloading other malware programs, installing them on the infected device and/or sending them further via Bluetooth; and remotely performing commands in the console. Now, Kaspersky Lab’s products detect this malicious program as Backdoor.AndroidOS.Obad.a.

The most important strings containing the C&C address undergo an additional stage of decryption. For this, the Trojan first checks if Internet access is available, then downloads the page facebook.com. It extracts a certain element of that page, and uses it as decryption key. Thus, Backdoor.AndroidOS.Obad.a can only decrypt C&C addresses when Internet access is available. This feature further complicates the analysis of this piece of malware...

After the first launch, the malicious application collects the following information and sends it to the C&C server at androfox.com:

For the less technically minded, try this - Panopticlick via EFF. It'll give you a (very rough) statistical rarity of your browser signature which can be used to trace you (cf mobile phone metadata methods)

If I have offended, I apologise. If you think I had anything malicious in intent to you, ask Tyler to delete my account. Or I shall do so.

I can assure you I had neither in mind, and any comments directed at you were from things I read / were sourced by others (as I attempt to link to each time). All the other fluff was just humor / meta-play - and I have repeatedly stated that I am not important.

[Edit - if you aren't extremely pissed off with me, ignore: that phrase has a particular vibe to it in certain places.]

"In the fall of 1997, Bill McCoy, having recently gone off of his heart medication was found dead in his favorite chair. In the days and weeks before he had been advised by Tyree that a Pakistani hit man, on an Israeli contract had been in the states seeking to fulfill a hit on McCoy. There had been other hints that someone closer to McCoy might do the job. Tyree recently told FTW that just before his death, he had given McCoy information on "Elbit" flash memory chips, allegedly designed at Kir Yat-Gat south of Tel Aviv. The unique feature of the Elbit chips was that they worked on ambient electricity in a computer. In other words, they worked when the computer was turned off. When combined with another newly developed chip, the "Petrie," which was capable of storing up to six months worth of key strokes, it was now possible to burst transmit all of a computer's activity in the middle of the night to a nearby receiver - say in a passing truck or even a low flying SIGINT (Signals Intelligence) satellite. According to Tyree this was the methodology used by Jonathan Pollard and the Israeli Mossad to compromise many foreign embassies in Washington".

knowledge is power I think.... Orwellian Banana Republic ? You are correct IMHO it is not 1984 but Homage to Catalonia..... Can't figure who the POUM anarchists are but we sure know who fascist were/are... History tells us this is foreshadowing of some bad broken window things.... Is it too late to have Kennedy orders to get the missiles out of Turkey, or have do over on 64 conflicts by the military offense complex? Oh yea China has less prisoners than US and spends 15 times more on defense (really offense)... DID ANYONE EVER THINK FACTS WOULD BE TREASON? How about the 700 page Constitution project? Yes Cincinnati be my guest.... http://www.icij.org/ coup d'état by 1% banker,medical,military cabal. Sad the rule of law has stooped to Dean Vernon Wormer of Animal House fame... You know "double secret probation"... in these courts...

There have been recent occurrences of online passwords needing to be reset because of "suspicious activity." Once the password has been changed and the account is accessable, the record of account activity shows no unusual logins. Anyone else seeing this?

No need for leak...only need to write truths on ZH and it flows into the main system because the food of truth is nourishing for those who still have some semblance of a connection to it....and it feels good in the heart...eh!

While photographing 'outside' of Your mail they could potentially take scans similar to airport snans of your mail.Using subject/object recognition similar to used in digital cameras to recognize scene and faces they could discover if your ar sending mobile phone very rapidly. Thus one would avoid sending any 'suspicious object' by snail mail. Also with bright light it is possible to also 'scan' actual content of letter, using text recognition content could be analysed with same tools and speed as an e-mail. So I think snail mail is pretty unsecure.

Years ago I figured that I needed at least 5 computers: One that would never be on the net, one that would only be used on a few sites (for subscriptions, purchases etc) and one that would be used for all unsecure net surfing, ready to be erased at the drop of a hat. I can't remember what the other two would be for, probably some kind of "quarantine" (start with a new computer, download something, see what has changed).

Now I think we all should have an extra couple of computers that just continually shuffle large video and text files back and forth 24/7/365...

Please to educate Yourself about 'browser fingerprinting', 'cross browser cookies', 'user behaviour patterns'. Last one is more opaque but the idea is that it is possible with degree of certainty to identify you by way/speed you type, move your mouse, what spelling errors you make often. All this can be done with only browser.

Major email proveders have very sophisticated client side browser scripting, thus one would assume it does 'little' more than simply provide basic functions.

Thus another option would be to connect to e-mail providers with old software Outlook or Mozilla Thunderbird using POP3 protocol as client identification will be limited to IP address. No e-mail saving 'as you type' for example. One more advantage is that this way you can write message separately from being actually online to send it, thus even more reduce Your exposure.

P.S. How can anyone possibly be held accountable for what is on their computer? My computer automatically "updates" itself every week or whenever it feels like it. My pre-installed "anti-virus software" does fuck knows what whenever it does. My so-called "28Mbps" and "54Mbps" modems rarely work faster than 30kbps (as far as I know). To assume that stuff is on my computer only because I put it there is not "naive", it is out right BS from the start! I have zero knowledge of what "updates" and "AV" is really doing, and I have zero knowledge of why my modem is working a thousand times slower than advertised - yes it could simply be a cheap ISP squeezing out the last bit of bandwidth amongst too many customers, but I can't prove that.

I can give my paranoia a 50-50 chance of being right, but at the moment my typing is appearing on the screen extra slowly. And I have no way of finding out why.

if you haven't noticed, the entire WASKI is obsessed with nonsensical gibberish right now.

an effective way to starve the beast might be to bounce that gibberish right back to from which it came. more of a smother tactic, then starve, but these do not necessarily need to be mutually exclusive.